Information Technology, Security, Hacking Made Simple

I have joined forces with friend and fellow security professional Jason for an all new radio show called Bring Your Own Security! We’ll be live in Jan 2018, and you can follow us on Twitter @byosradio for updates as to

So the Dave The IT Guy podcast will be changing starting next week! Dave has partnered with another CISSP (Dave just passed his CISSP test this past Monday and is awaiting final awarding of the designation) how is named Jason

Breaches of data are coming at the rate of almost 1 reported breach (and how many unreported breaches??) per day. With so many major data sources being breached more than 3 Billion people have been affected. That’s more than the

Cisco’s Talos researchers discovered that the official site that distributes the popular CCleaner tool was compromised between Aug 15th and September 12th of 2017. During this time, a version of CCleaner was uploaded that had Malware designed to install other

Take time to take a listen as we interviewed BugCrowd’s Jason Haddix. As their head of Trust and Security, and their #1 ranked researcher for 2014/2015, Jason certainly knows his way around bug bounties, pen testing and security. If you’ve ever

Be careful clicking links coming from within Facebook Messenger. Regardless of if you’re using Mac, Linux or Windows, Chrome, Safari, Firefox or IE, they are all susceptible in some manner. What looks like an innocent video is actually a redirected

Today Wikileaks released the newest Vault 7 release of information regarding the United States’ Central Intelligence Agency. The CIA’s Office of Technical Service (OTS) is the group responsible for supplying CIA operatives with tech gadgets, spy items like secret recording

The USS John McCain Guided Missle Destroyer recently ran into a commercial ship causing damage and more importantly, loss of life. How does a US Navy ship that has advanced computer systems, hundreds of crew members simply run into another

BlackHat 2017 was one for the record books. Record attendance by the media, record attendance by security researchers from more than 80 countries around the world, and record attendance by the vendors from the security sector. I even spoke to

Petya is a Ransomware variant that as of the writing of this post, is currently hitting the European continent. Russian energy giant Rosneft, US Pharmaceutical giant Merck and the largest shipping container company in the world Maersk is currently being

Do you really need antivirus software on your computer these days? With all the new malware tools, security tools, is antivirus a 90’s dinosaur? What about tablets and cell phones? If you decide you really need it, are the free

You’ve heard me on IHeartMedia stations around the United States for the last 3 years for random tech and security topics. Now, tune in live and be able to join me in discussion on many tech topics. We’ll have scheduled

You have a children using Internet connected devices every day. However, you would like to be able to control what they see, or even how long they are online. Maybe you want to control specific applications? Maybe you’re not really

Update June 2 2017- You can follow this link to see how to sign up, download and start using NordVpn on any of your devices (Cell, Laptop, Tablet, Desktop) in under 4 minutes. Well worth watching and if you don’t

There are several terms that indicate an attempt by a hacker to trick you into giving your login credentials to them. The terms phishing, spearphishing and whaling are all related to the attempt to trick you via a fake email.

Just to be transparent: I did not vote for, nor support in any manner, Donald Trump for President during his campaign. However, he was elected, I am an American and I support him in his endeavor to help move our

There has been quite a bit of talk this election cycle about Clinton’s email server. Sure it had classified info on it, regardless of what Clinton says. However, is it really that important? Outside of the tech people who really

Join me and thousands of others at this year’s Scarefest event in Lexington, Ky. September 30th to October 2nd at the Lexington’s Convention Center. If you’ve never attended before, and you are a horror or paranormal fan, this is THE

Credit card skimmers are a real thing, right here in the USA. Where can you find them? ATM machines, gas pumps, anywhere that an unattended credit card can be used. What do these skimmers do? They are a piece designed

**UPDATE**- This class has been scheduled for June 23-15th in Middletown Ohio, with some VERY awesome and unique changes that no other survival experience has to offer!! Check out www.dtig.net/survival for all the details and to register. Only 25 seats